Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
40e74817deceb0fcdbb474cb9637af40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40e74817deceb0fcdbb474cb9637af40N.exe
Resource
win10v2004-20240802-en
General
-
Target
40e74817deceb0fcdbb474cb9637af40N.exe
-
Size
46KB
-
MD5
40e74817deceb0fcdbb474cb9637af40
-
SHA1
cf847d836257011b92bcf763c049935be07cd05a
-
SHA256
e20f22fb2464445807ad025d228846f5776be5c495b82faadbeaaec7056b342d
-
SHA512
48a24a2a693918110bb8204e1e56b9470c5f955d7695cda75885daacfb07afa7c056efdd02d8a17ff7c356caed242bc7cfb1cfdf03a355511b1449648f58947e
-
SSDEEP
768:vIO9Foa6fC+vr2KYc9F53YiShcUwSAMxkEVF:vzFF65rqyF537SSUwwxf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40e74817deceb0fcdbb474cb9637af40N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 40e74817deceb0fcdbb474cb9637af40N.exe